General

  • Target

    102dcd59db57f80c64e544a4d48bb548fd4c840191d9287a1d148901a54b01fe

  • Size

    35KB

  • Sample

    220212-g5gq6saegq

  • MD5

    d4ede4ee7b47d0134bcba66182f04c2a

  • SHA1

    14e7b70de341667d276c3a5253e21b9e3a6b8987

  • SHA256

    102dcd59db57f80c64e544a4d48bb548fd4c840191d9287a1d148901a54b01fe

  • SHA512

    e41f6dc6978fd076c72b4331b7f1e5b5e85b5996bdc3bfa733c78ecf35860b593eb480a19481785612d423d233eb7b1cc4b60e599bd27c675731e1af864ae3a1

Malware Config

Targets

    • Target

      102dcd59db57f80c64e544a4d48bb548fd4c840191d9287a1d148901a54b01fe

    • Size

      35KB

    • MD5

      d4ede4ee7b47d0134bcba66182f04c2a

    • SHA1

      14e7b70de341667d276c3a5253e21b9e3a6b8987

    • SHA256

      102dcd59db57f80c64e544a4d48bb548fd4c840191d9287a1d148901a54b01fe

    • SHA512

      e41f6dc6978fd076c72b4331b7f1e5b5e85b5996bdc3bfa733c78ecf35860b593eb480a19481785612d423d233eb7b1cc4b60e599bd27c675731e1af864ae3a1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks